Load-Balancing Security

Distributed network architecture provides scalability in industry environment

Global enterprises and large, multi-site hospitals, universities and government agencies are increasingly facing a common challenge: how to bring all of their disparate buildings into an easy-to-manage enterprise security system. Most multi-site organizations have a variety of sites that range in size from small branch offices to large, multi-building campuses.

When it comes to designing an enterprise access control and security solution, security directors and IT managers need to balance several competing priorities:

  • Maintaining an up-to-date synchronized database of all personnel across all sites;
  • Monitoring events, alarms and activity reports from a central location;
  • Ensuring management at each site can autonomously manage day-to-day activities, such as adding/deleting personnel or changing access control privileges; and
  • Protecting the system and facilities against network failures.

Using different standalone access control solutions at each site can achieve priorities [three and four], but this strategy makes central monitoring and staff management impossible. Designing a true enterprise security system that is easy to use and delivers all four priorities requires an access control solution that can effectively manage the volumes of data produced by large enterprises via distributed network architecture.

Why should security directors and IT managers consider a distributed approach?

For end users, it is the only solution that delivers on all four priorities. For systems integrators, it avoids the labor and headaches of manually constructing interfaces between standalone systems.

Defining Enterprise and Distributed Network Architecture>
An enterprise is a company or organization consisting of two or more facilities that are either locally situated or widely dispersed. An enterprise could be multiple facilities grouped together in the same area -- such as a hospital campus, with its main building surrounded by clinics or doctor’s offices. Or it could be a large global company that comprises many buildings that can be hundreds, even thousands, of miles apart from one another.

The key framework of a distributed network architecture includes the distribution of decision-making and control to each site while simultaneously networking and synchronizing the sites via a central hub.

What End Users and Integrators Want
Distribution of decision-making and control to each site are essential for two reasons. First, local site managers need the flexibility to manage the security needs specific to their site. From adding personnel to modifying access rights, they need the ability to manage their system day-to-day without fear of losing network connectivity or bandwidth to a central, off-site server. Second, from a scalability perspective, well-designed security architecture avoids unnecessary data transmission and bandwidth consumption. For example, adding a new contractor and assigning him/her access privileges at a single local site should not require communication back to a central server.

While local site control is essential, enterprises also need easy-to-configure synchronization of security data between sites. Key factors essential to a “networked” architecture include:

  • Instant and scheduled synchronization: Security directors need real-time notification about critical events and alarms, as well as the ability to schedule synchronization of non-critical activity to better manage peak network use.
  • Tolerance of network outages: Multi-site synchronization must survive brief or extended network outages. When a site or the central server comes back online, synchronization must restart automatically.
  • Scalability from large to small: Most enterprises have a mixture of small sites -- such as four to five reader sales offices -- and large office buildings. Enterprise architecture must incorporate all sites, big and small, into the network.

A well-designed distributed network architecture also gives enterprise security and IT directors powerful central management capabilities. Central personnel management -- defining and changing global access control privileges and editing personnel details -- is the essential starting point. However, true central management goes beyond staff. Security directors also need the ability to create an integrated, multi-site event viewer and to centrally manage, monitor and configure their panels and readers.

To satisfy IT, the multiple autonomous servers at each site in distributed network architecture must be able to communicate with the central hub via either a LAN or WAN.

Return on Investment
The key benefits of a distributed network architecture include: scalability, efficiency, cost and reliability.

Scalability. Enterprise solutions that rely on a single server inevitably suffer from performance issues as the company grows and the server is overwhelmed. Moreover, single-server solutions are highly susceptible to network failures. Distributed architecture balances the load across multiple servers at each site.

Efficiency. Security managers control the flow of data and decision-making, minimizing network bandwidth and allowing them to focus on their business. At the same time, centrally located security staff can easily run reports, make changes, and view the status of local sites without needing to login to multiple separate systems.

Cost. Servers and software at each local site can be sized appropriately to meet each site’s specific needs, without requiring installation of an expensive server at even the smallest sites.

Reliability. Distributed network architecture is much more resistant to network and hardware failures than a single, central server approach.

These benefits can be made clear with a simple use case in which a large organization wants to integrate its access control system with its enterprise resource planning (ERP) system to eliminate replication and redundancy of employee data. With a distributed, but not networked, architecture using separate standalone access control solutions, the organization needs to pay for and maintain multiple, separate ERP integrations to the access control software at each local site.

With a networked, but not distributed, architecture -- the classic, singleserver approach -- only one integration is required, but system performance is poor at local sites and network bandwidth consumption is high. Distributed network architecture offers a single, cohesive solution that allows for a single ERP integration and optimized system performance and network bandwidth.

The early generations of enterprise security solutions focused on access control functions and harmonizing those with an organization’s personnel database. Today, it has evolved into complete control at every site and the ability to manage access points, card readers and alarm monitoring from a central location.

The range of an access control system’s capabilities is expanding, thanks to the distributed network architecture, because it solves the performance, scalability and load-balancing issues inherent in single-server architecture. Finally, security directors can ask for an access control solution that delivers on all of their security priorities.

This article originally appeared in the June 2011 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3